Another article link from my dusted-over ~jot directory: The Insecurity of Security Questions: Why I met my wife in CWmKryWzuxCSAnMDuIg. [So dusted-over is my ~/jot directory that Tom Moertel, the article's author, has changed he link schema of his blog without providing redirects. (The slashes in the date turned to dashed.) Cool URLs don't change, Tom, not according to the
By Rowan Rodrik, 3 weeks ago, on March 14, 2015, at 17:03 |
In August 2011, probably while procrastinating learning for my university admission exams, with one mouldy foot still in my IT-past, I signed up for Security Override, an online game designed to turn network security n00bs such as myself into novices.
By Rowan Rodrik, 3 weeks ago, on March 14, 2015, at 16:03 |
I wanted to change the text of visited links on payformystay.com, using CSS. In the offer summary, I wanted to change the link text "Check it out!" with "Check it out again!" after the user had indeed checked out the offer.
By Rowan Rodrik, 2 years ago, on March 01, 2013, at 22:03 |
A year ago, my web host thoroughly explained how PHP include vulnerabilities can be exploited, hoping that better user education would leave less member-sites vulnerable to automated attacks by spammer scum.
By Rowan Rodrik, 4 years ago, on November 14, 2010, at 19:11 |
I don't believe in system passwords if they're not backup by some type of disk encryption. It's simply too easy to circumvent by changing a few boot parameters or by inserting a good boot disk. For performance reasons, I've decided against using full-disk encryption for my laptop and even against encryption for my home folder. This makes typing in a password to login a mere annoyance. Admittedly, my laptop features a fingerprint reader, but at the time I couldn't get it to work and it still requires me to type in my username, which I find just as superfluous. Also, fingerprints aren't that secure either.
By Rowan Rodrik, 5 years ago, on June 20, 2010, at 00:06 |
Matriux is a fully featured security distribution consisting of a bunch of powerful, open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administration, cyber forensics investigations, security testing, vulnerability analysis, and much more.
By Rowan Rodrik, 5 years ago, on February 01, 2010, at 00:02 |